exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2017-09-04

Blue Team Training Toolkit (BT3) 2.4
Posted Sep 4, 2017
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: Improved input validation routines. Pcapteller module now supports SMB/SMB2 and NBNS packet payload manipulation. Documentation updates and minor adjustments.
tags | tool, python
systems | unix
SHA-256 | a89c895e226870d4a187787ae94b98a04fbcb0a31f0e711d39b40e3db1b26b4c
Flawfinder 2.0.4
Posted Sep 4, 2017
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Now directly supports pip installs. Switched from distutils to setuptools.
tags | tool
systems | unix
SHA-256 | 43ffe3bd19cafbc4f24c53c6d80810297ebfbf9a72b693e58e59775813ee66ec
Tinc Virtual Private Network Daemon 1.0.32
Posted Sep 4, 2017
Authored by Ivo Timmermans | Site tinc.nl.linux.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: Now supports PriorityInheritance for IPv6 packets. Various bug fixes.
tags | tool, encryption
systems | unix
SHA-256 | 4db24feaff8db4bbb7edb7a4b8f5f8edc39b26eb5feccc99e8e67a6960c05587
Ubuntu Security Notice USN-3408-1
Posted Sep 4, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3408-1 - It was discovered that an illegal address access can be made in Liblouis. A remote attacker can take advantage of this to access sensitive information. It was discovered a heap-based buffer overflow that causes bytes out-of-bounds write in Liblouis. A remote attacker can use this to denial of service or remote code execution. It was discovered a stack-based buffer overflow in Liblouis. A remote attacker can use this to denial of service or possibly unspecified other impact. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, code execution
systems | linux, ubuntu
advisories | CVE-2017-13739
SHA-256 | f3ba5935a40f160db99d5d196f0b4d6102f67aa4b826403352ef95b9775b3862
Wibu Systems AG CodeMeter 6.50 Cross Site Scripting
Posted Sep 4, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Wibu Systems AG CodeMeter version 6.5.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 61c51042dec76d0248537423dac3c5d79c859d526ba59af8555d968b688594c1
WordPress WpJobBoard 4.5.1 Cross Site Scripting
Posted Sep 4, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

WordPress WpJobBoard plugin version 4.5.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 07f7f6d48ad93e7984851607c9871b1ca877c2ba12241a8dead54dca41a86c56
Wireless Repeater BE126 Remote Code Execution
Posted Sep 4, 2017
Authored by Omer Kaspi, Hay Mizrachi

Wireless Repeater BE126 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-13713
SHA-256 | c8e19ae886cb77a18bac562c6f3f7e9904f47cc6b3126817182087d1199b7f4d
RubyGems Arbitrary File Overwrite
Posted Sep 4, 2017
Authored by mame

RubyGems versions prior to 2.6.13 suffer from an arbitrary file overwrite vulnerability.

tags | exploit, arbitrary
advisories | CVE-2017-0901
SHA-256 | 5f0b5ac5db21edcc3e5c32e56de1609e34f4b58dbabc2dc6559d4ca4c790e216
eNom Inter-Account Transfer Issue
Posted Sep 4, 2017
Authored by Joseph Harris

eNom appears to not check for any confirmation from owners when performing domain transfers.

tags | exploit, bypass
SHA-256 | 7d1433ffdd79806fa4a68d7ea53eabd7f14ddfaacf0cc208ce1f0b2f176d6f1d
libgedit.a 3.22.1 Denial Of Service
Posted Sep 4, 2017
Authored by Hosein Askari

libgedit.a versions 3.22.1 and below suffer from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-14108
SHA-256 | cac7e3249daa80e7e6c5fee8123d3bb7156fe3aed36f5446e5a5caf356d6d9ac
Motorola Bootloader Kernel Cmdline Injection / Bypass
Posted Sep 4, 2017
Authored by Roee Hay

Vulnerable versions of the Motorola Android Bootloader (ABOOT) allow for kernel command-line injection. Additionally it suffers from a bypass vulnerability.

tags | exploit, kernel, bypass
advisories | CVE-2016-10277
SHA-256 | f8f8777805bf6e98e486f708a506572461b27529339eefe20434106273e475dc
Play TV 1.25.1 Build r123776 DLL Hijacking
Posted Sep 4, 2017
Authored by Vulnerability Laboratory, Lawrence Amer | Site vulnerability-lab.com

Play TV version 1.25.1 build r123776 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 3d3e46dc9cf7d9a59aa5450993ae9e8bb4500c8cb58df1e02ea572305a39a99e
Code Injection - HTML Injection
Posted Sep 4, 2017
Authored by Shritam Bhowmick

Whitepaper that discussions both code and html injection attacks.

tags | paper
SHA-256 | b3ca3731546e7a16718658a97d74c12127c957c735d7ff2df490f9ac9336b9fb
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close